Prev: ip rule with fwmark not working in 2.6.31?
Next: Getting traffic rate traces bound to each active tcp link
From: karthikbalaguru on 20 Dec 2009 21:30 Hi, It seems that the leaky-bucket and token bucket implementations can be combined to provide maximum efficiency and control of the traffic flows into a network. Reference - Section 'Inefficienty of leaky bucket implementation' in http://en.wikipedia.org/wiki/Leaky_bucket What is the name of the algorithm that combines both the leaky-bucket and token bucket ? Is there any opensource implementation of it ? Thx in advans, Karthik Balaguru |